Reputation: 595
Conceptually is it possible to create an IAM policy such that developer can only create/delete its own 50-net (e.g. 50.10.0.0/16) VPC? Or do we usually rather having the network admin to allocate the VPC to developer coming on board?
I want to organize the org such that
User : VPC
dev-1: 50.10.0.0/16
dev-2: 50.20.0.0/16
dev-3: 50.30.0.0/16
Thanks!
Upvotes: 0
Views: 164
Reputation: 270094
A CIDR range starting with 50.
is publicly routable and should generally be avoided. It is better to allocate ranges from these address blocks, which are intended for private use:
See: What Is a Private IP Address & What Are the Ranges?
Multiple VPCs can be created with the same CIDR range, so each developer could have their own range of private IP addresses that overlap each other. It simply means that they cannot be (easily) joined together.
It is not possible to restrict a user's CIDR range when creating a VPC.
See: Supported Resource-Level Permissions for Amazon EC2 API Actions - Amazon Elastic Compute Cloud
You can, however, restrict which actions they may use. So, you might provide them with a VPC, deny permissions to create other VPCs, but allow them to create/delete subnets within the VPC.
See: Controlling Access to Amazon VPC Resources - Amazon Virtual Private Cloud
Upvotes: 1